Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1124s -
max time network
1129s -
platform
windows10-2004_x64 -
resource
win10v2004-20231127-en -
resource tags
arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system -
submitted
08/12/2023, 10:29
Static task
static1
Behavioral task
behavioral1
Sample
todxofs.dll
Resource
win7-20231201-en
Behavioral task
behavioral2
Sample
todxofs.dll
Resource
win10v2004-20231127-en
General
-
Target
todxofs.dll
-
Size
421KB
-
MD5
f40160b2cfe0667cb4010a400a835a06
-
SHA1
976c70ede8d10e825cb9e5bd5da0dd2a251bd0e8
-
SHA256
d63088780e90eda6a7ce286d6b190614f0ea6f1f55c6e6e9d6a30260eb84d03c
-
SHA512
e919819cdc45b2ed93c69f3f0267698940ee316707f6a722697100bfa79da9d277667c0276f36ba47f62dea8855e18e0e8ffaf5a708b369d73d2961b9fdfc3b4
-
SSDEEP
6144:tZXN7Sgy8WA3gha780p2F2V6voOy5Gn7n0O8N5WYeXmseY1rmWd2KWJ:tjSgyhA30a78rQqIN5te20qWd2KWJ
Malware Config
Extracted
zloader
April23Fixed
April23Fixed
http://wmwifbajxxbcxmucxmlc.com/post.php
http://onfovdaqqrwbvdfoqnof.com/post.php
http://cmmxhurildiigqghlryq.com/post.php
http://nmqsmbiabjdnuushksas.com/post.php
http://fvqlkgedqjiqgapudkgq.com/post.php
http://iawfqecrwohcxnhwtofa.com/post.php
http://nlbmfsyplohyaicmxhum.com/post.php
http://snnmnkxdhflwgthqismb.com/post.php
-
build_id
120
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3952 set thread context of 4588 3952 rundll32.exe 110 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSecurityPrivilege 4588 msiexec.exe Token: SeSecurityPrivilege 4588 msiexec.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3460 wrote to memory of 3952 3460 rundll32.exe 86 PID 3460 wrote to memory of 3952 3460 rundll32.exe 86 PID 3460 wrote to memory of 3952 3460 rundll32.exe 86 PID 3952 wrote to memory of 4588 3952 rundll32.exe 110 PID 3952 wrote to memory of 4588 3952 rundll32.exe 110 PID 3952 wrote to memory of 4588 3952 rundll32.exe 110 PID 3952 wrote to memory of 4588 3952 rundll32.exe 110 PID 3952 wrote to memory of 4588 3952 rundll32.exe 110
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\todxofs.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\todxofs.dll,#12⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3952 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4588
-
-